Identity Insights: Social, Local and Mobile Identity

573 views
448 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
573
On SlideShare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
31
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Identity Insights: Social, Local and Mobile Identity

  1. 1. Identity Insights:Social, Local, and Mobile IdentityDipto Chakravarty Jon BultmeyerVice President of Product Management / NetIQ Director R & D, Identity, NetIQdipto@netiq.com jbultmeyer@netiq.comFebruary 3rd – 7th 2013
  2. 2. Mega Trends Redefining “Identity” •  User –  Shift in privileges and premises driving complexity •  Data –  Data shifting to Knowledge, and to Intelligence •  Resource –  “Work stations” shifting to PDAs; BYOD paradigm •  Identifier –  Pervasive unique identifier for users and resources •  Security –  Context-awareness with privacy, trust and location •  User is in charge of creating identities through self-service freemium services •  Data shifts to intelligence as it commoditizes Big Data to self-service analytics •  Resource emphasis switched; what was iWork 9-5 and iLife 5-9 have blended •  Identifier ascended to IMEI and ubiquitous handles beyond user identity or access •  Security needs to be leveraged via RTLS to drive Privacy and Trust beyond events2 © 2012 NetIQ Corporation. All rights reserved.
  3. 3. Power Shift in Managing Identities •  Shift towards organizing vs. prescribing user identities •  Shift to serve fine-grain targeted access for users •  Need for agility without losing governance or control •  Shift to accommodate the blurred enterprise walls •  Shift to segmentation of personal data into 4 sub-types … Applying IAM Techniques to Consumer Data (Eve Maler)3 © 2012 NetIQ Corporation. All rights reserved.
  4. 4. Power Shift to the Users •  2,000,000,000 internet users •  5,600,000,000 mobile 7 billion users subscribers1 Billions of identities •  300,000 mobile applications accessing millions of downloaded 11,000,000,000 applications from times2 access points, trillions of times a day •  1,000,000 users took AOL 9 11 billion access, years, Facebook 9 months, downloads and DrawSomething 9 days3 1 ABI Research, Nov 2011 2 IDC Research, Aug 2011 3 Business Insider, Mar 2012 4 Forrester Research, Sep 20114 © 2012 NetIQ Corporation. All rights reserved.
  5. 5. Delivering the Core Identity Functions
  6. 6. Shift to Services, Analytics and Intelligence Innovation Context and Intelligence via enriched external feeds Analytics Catalog, Access and Governance Commoditization Platform Services Directories, Resources,Policies Security Provisioning On-premise Off-premise6 © 2012 NetIQ Corporation. All rights reserved.
  7. 7. 1. Identity Management •  Customers want … Private Managed Utility –  Integrated solutions –  Lower cost of ownership –  Flexible deployment model On-premise Outsourced Off-premise enterprise service hosted •  Our Innovation solution provider hybrid solution solution –  Pre-fab soft appliance –  Small footprint solution –  Well-defined SLAs Past Present Future7 © 2012 NetIQ Corporation. All rights reserved.
  8. 8. 2. Identity Services •  Customers want to … Cloud based –  Selectively host services Applications Iteratively deploy solutions Authentication –  –  Maintain financial flexibility Administration Authorization Attribute Audit •  Our Innovation –  SaaS-based solution –  Cloud-ready services Directory HR –  Capex to opex shift Enterprise User8 © 2012 NetIQ Corporation. All rights reserved.
  9. 9. 3. Identity Analytics •  Customers want to –  Retrieve service catalogs –  Access from mobile devices anywhere anytime •  Our Innovation –  Mine for permissions and usage –  Provide context to resource, groups and roles Identity and Security Backend Systems9 © 2012 NetIQ Corporation. All rights reserved.
  10. 10. 4. Identity Intelligence •  Customers want –  Context for decision-making –  Knowledge from catalogs10 © 2012 NetIQ Corporation. All rights reserved.
  11. 11. 4. Identity Intelligence (Contd.) •  Our Innovation –  Visualize employee roles with context to make decisions –  Visualize permissions (plus resources) –  Visualize policies (with related attributes) Identity Access Intelligence: Making IAM Relevant to the Business (Earl Perkins)11 © 2012 NetIQ Corporation. All rights reserved.
  12. 12. Understanding the Identity Continuum
  13. 13. Two Pillars of Identity Management PROVISIONING INTELLIGENCE Small organizations Big Index of User Id-s using soln in the cloud In the Cloud Via UserID Lens instead of any big data Mature organizations User-activity risks from extending to the cloud events and RTLS feed To the Cloud Via Risk Lens Orgs managing cred- entials from the cloud User Id social feeds - LinkedIn, Facebook From the Cloud Via Social Lens Note: RTLS or Real-Time Location Services track the identity of users by tracking the location in real-time using inexpensive tags that receive signals.13 © 2012 NetIQ Corporation. All rights reserved.
  14. 14. Two Pillars Intertwined Together PROVISIONING INTELLIGENCE Small organizations Big Index of User Id-s using soln in the cloud instead of any big data Mature organizations User-activity risks from extending to the cloud events and RTLS feed Orgs managing cred- entials from the cloud User Id social feeds - LinkedIn, Facebook14 © 2012 NetIQ Corporation. All rights reserved.
  15. 15. Identity Management in the Cloud •  Drivers •  Drive revenue growth •  Lower cost, or improve operating margins •  Provide competitive parity or differentiation •  Is it an enablement or discrete business? •  Key Trends •  Smaller organizations opting for turnkey provisioning solutions •  Larger organizations, e.g, Telecoms, are leveraging “in the cloud” solutions for specific user populations15 © 2012 NetIQ Corporation. All rights reserved.
  16. 16. Identity Management to the Cloud •  Drivers •  Sustain existing revenue stream and operating margin •  Lower cost for companies with significant IT infrastructure on premises •  Is it a business model shift or new business? •  Key Trends •  Mature organizations are extending their existing infrastructure to manage SaaS and partner applications.16 © 2012 NetIQ Corporation. All rights reserved.
  17. 17. Identity Management from the Cloud •  Drivers •  Drive revenue in the SaaS market •  Hedge the bet with a hybrid solution •  Establish the business image as forward-looking •  Is it a new business model, risk mitigation, or both? •  Key Trends •  Organizations leveraging IDaaS for on-premise identities and applications. •  Hybrid solution to store user credentials on premises, while managing the system “from the cloud”. Best of both worlds.17 © 2012 NetIQ Corporation. All rights reserved.
  18. 18. Your Identity Continuum Your enterprise (on-premise) Your password-less devices and PDAs user credentials and passwords accessing SaaS applications (BYOD) Your service provider (off-premise) Your security is assured closer to MT user management console the enterprise than at the edge18 © 2012 NetIQ Corporation. All rights reserved.
  19. 19. Understanding the Identity Continuum
  20. 20. Your Identity in Context Devices via which Feeds correlated Privilege and Events/logs that user identity is against authentic roles governed by calculate the risk Powerful combination of permeated identity policies against identity Social feeds, Mobile devices, Event feeds, Appl feeds, Services feeds Materialized view of multiple MOBILE SOCIAL GOVERN SECURE sources map-reduced and contextualized to a single identity “Contextualization of User Identity”20 © 2012 NetIQ Corporation. All rights reserved.
  21. 21. Identity Solution Stack Securi knowledge External ty Mobile 4. Identity Identity Intelligence Intelligence Social Identity and AG Analytics 3. Identity Analytics Access Identity Analytics Governance 2. Identity Directory Resources Group Policies Roles Provisioning Services Identity Manager 1. Identity Mgmt Directory and Security Services21 © 2012 NetIQ Corporation. All rights reserved.
  22. 22. Summary •  Power shifts in Identity … leverage IDM’s ecosystem … aggregate tertiary feeds with user context •  Contextualize Identity … from platform to services, … from enterprise to off-premise hosting … by adding intelligence beyond the users NetIQ is the leading vendor in the space in terms of install-base and time in the market, and our vision is driving thought leadership to evolve today’s product to tomorrow’s solutions.22 © 2012 NetIQ Corporation. All rights reserved.
  23. 23. Sneak Peak for Future Identity Apps
  24. 24. Call to action line one and call to action line two www.calltoaction.com Thank you.24 © 2012 NetIQ Corporation. All rights reserved.
  25. 25. Worldwide Headquarters +1 713.548.1700 (Worldwide) 1233 West Loop South 888.323.6768 (Toll-free) Suite 810 info@netiq.com http://community.netiq.com Houston, TX 77027 USA NetIQ.com25 © 2012 NetIQ Corporation. All rights reserved.
  26. 26. This document could include technical inaccuracies or typographical errors. Changes areperiodically made to the information herein. These changes may be incorporated in neweditions of this document. NetIQ Corporation may make improvements in or changes to thesoftware described in this document at any time.Copyright © 2013 NetIQ Corporation. All rights reserved.ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, thecube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain MigrationAdministrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group PolicyGuardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQCorporation or its subsidiaries in the United States and other countries.

×